Online Anytime HIPAA Compliance Training (Level 1 & 2)


It is with this HIPAA Compliance training that you will able to understand the HIPAA law requirements and regulation pertaining to HIPAA security rule and provide you with the necessary guidance on how your organization can be HIPAA compliant. This training is updated in accordance to the HIPAA regulation because of the Health Information Technology for Economic and Clinical health which forms a part of the American Recovery and Reinvestment Act of 2009 (ARRA) Omnibus rule of 2013 and Electronic Health Records (EHR) & meaningful use incentives. The training should equip you to take the HIPAA certification test necessary for Certified HIPAA Privacy Security Expert.

Target Audience:

  • HIPAA Compliance Officer of covered entity & business associate
  • HIPAA Privacy Officer
  • HIPAA Security Officer
  • Managers
  • Healthcare Consultant
  • IT Auditors
  • Core Compliance Team members of covered entity & business associate
  • Lawyers involved in healthcare
  • Business Analyst for Software
  • Software Architect
  • Software development Project Manager
  • Healthcare quality assurance and risk managers

Free HIPAA Compliance Training Demo

We encourage you to call us to discuss your job role so we can recommend the appropriate HIPAA course to meet your learning objectives.

Total Course Duration: 25 hours
Audio: Yes
Number of Total Slides: 921 slides
Total Chapters: 27

Course valid for: 6 months from receiving the login details. You will not have access to online content after you complete the course.

Certificate valid for: 3 Years
Type of License: One user license cannot be transferred after login is assigned.

Continuing Education Requirements After Getting Certified:
Once a year all students will have to go through one hour of update course which will include relevant regulation changes and other OCR/HHS activities on compliance and enforcement.

To maintain your certification, you will continue taking update courses when they are released. You will receive a new certificate when your certificate will expire if you have taken all required update courses. You will NOT be required to take any test if you have taken the update courses regularly.

Certificate for Continuing Education Credits:

Students can buy CE credits certificate for this course at the time of registration. You will receive 25 CE credits for this course through Approved Provider of California Board of Registered Nursing after completing the course.

Free Online HIPAA Training Demo
Cost of online training and CHPSE certification test: $1200 (Additional Options to buy: $300 printed manual, $19.99 full-color 56 pages overview manual, $99 CHPSE practice test, $250 two hour of Instructor support, $180 unlimited CHPSE exam attempt)


Free Online HIPAA Training Demo
CHPSE Certification Test Only: $180 per attempt


CHPSE Certification Test:

You are only tested once upon completion of the training. You should have attained the 70% pass mark of the 78 question test for you to receive the HIPAA certification of the Certified HIPAA Privacy Security Expert.

This test should only take 2 hours 10 minutes whereby in the event you pass the test you can print the certification immediately but if you do fail you will have to pay $180 for a retake.

Test Format: Multiple Choice Questions.

CHPSE Course Learning Objectives:

Chapter 1 – HIPAA Basics

  • Understand the purpose for HIPAA legislation
  • Review the HIPAA Administrative Simplification title
  • Review non-compliance penalties (civil and criminal)
  • Review key organizations associated with administering HIPAA Administrative Simplification provisions
  • Review HIPAA-related terminology and definitions

Chapter 2 – Transactions & Code Sets Overview

  • Understand motivation and drivers behind requiring HIPAA standard transactions and code sets

Chapter 3 – Transactions – ANSI X12 and NCPDP

  • Examine the ANSI ASC X12 & NCPDP transactions

Chapter 4 – Code Sets & National Identifiers

  • Understand the code sets approved for use with HIPAA-covered transactions
  • Understand national identifiers that have been adopted or may be adopted to identify entities or individuals in HIPAA-covered transactions

Chapter 5 – HIPAA and Health Data – Security & Privacy Requirements

  • Describe how HIPAA relates to health information exchange
  • Identify the steps for compliance with the HIPAA Privacy Rule
  • Identify the steps for compliance with the HIPAA Security Rule
  • Review compliance framework

Chapter 6 – HIPAA Privacy Rule

  • Understand the core requirements, key terms, and concepts of the Privacy Rule

Chapter 7 – Privacy Rule – Organizational & Individual Relationships, Rights & Responsibilities

  • Understand Organizational Relationships
  • Explain Individual Privacy Rights

Chapter 8 – Privacy Rule – Notice of Privacy Practices

  • Understand HIPAA Notice of Privacy Practices (Notice) and Authorization requirements and how to draft and distribute paper and electronic Notices of Privacy Practices and appropriately use an Authorization

Chapter 9 – Privacy Rule – Uses and disclosures of PHI

  • Understand the general rules regarding use and disclosure of PHI
  • Understand the rules regarding disclosure for treatment, payment, and health care operations
  • Understand the rules regarding disclosure for public purposes

Chapter 10 – Privacy Rule – Safeguards

  • Understand the necessary safeguards to comply with the HIPAA Privacy Rule security requirements and appropriate privacy practices

Chapter 11 – HIPAA Security Rule – Overview

  • Describe the scope of the HIPAA Security Rule.
  • Understand threats and attacks that make healthcare enterprises vulnerable
  • Define key security terminology, concepts, and categories
  • Describe administrative safeguard implementation specifications.
  • Describe physical safeguard implementation specifications.
  • Explain technical safeguard implementation specifications.
  • Describe organizational requirements.
  • Describe the policies and procedures standards, as well as the documentation standards.

Chapter 12 – HIPAA Security Rule – Threats and Technology Options

  • Identify technical/electronic threats to the health care enterprise
  • Explain security technology and electronic protections options that may meet Security Rule and Privacy Rule security provisions compliance requirements

Chapter 13 – Advanced Administrative Safeguards

  • Describe the requirements for the Security Awareness and Training standard
  • Explain the requirements for the Security Incident Procedures standard
  • Describe the requirements for the Contingency Plan standard
  • Describe the requirements for the Evaluation standard
  • Describe the Business Associate Contract and Other Written Arrangements standard

Chapter 14 – Physical Safeguards Overview

  • Explain key steps for a physical safeguards assessment based on the HIPAA Privacy Rule

Chapter 15 – Advanced Physical Safeguards

  • Describe physical safeguards requirements
  • Review facility access control
  • Describe workstation use and security standards
  • Describe required and example policies, procedures and practices to reasonably ensure appropriate physical safeguards have been implemented

Chapter 16 – Physical Safeguards – Data & Media Management

  • Describe requirements for device and media controls

Chapter 17 – Security Technical Safeguards Overview

  • Describe the Security Rule defined Technical Safeguards
  • Describe the Access Control standard
  • Examine the Audit Control standard
  • Describe the Integrity standard
  • Identify key elements of the Person or Entity Authentication standard
  • Review the Transmission Security standard

Chapter 18 – Security Advanced Technical Safeguards

  • Describe the Transmission Security standard
  • Examine the Transmission Control Protocol/Internet Protocol (TCP/IP) architecture and its key protocols
  • Analyze firewall systems and their role
  • Examine Virtual Private Networks (VPNs)
  • Describe wireless security requirements
  • Identify types of encryption that may be supported by health care entities
  • Describe core elements of Windows security.

Chapter 19 – Digital Signatures and Certificates

  • Explain the requirements of the proposed Security Rule’s electronic signature requirements (not included in the final rule)
  • Describe a digital signature
  • Describe a digital certificate and its relationship to a digital signature
  • Examine the role of a Public Key Infrastructure (PKI) in supporting requirements for digital signatures

Chapter 20 – Security Policy and Standards

  • Explain how identifying threats and vulnerabilities impact risk management strategies and the development of appropriate security policies
  • Describe ISO/IEC 27002 and ISO/IEC 27001 standards
  • Identify factors that impact the development of an enterprise security policy
  • Describe security policy documents that address areas, such as acceptable use policies

Chapter 21 – American Recovery & Reinvestment Act

  • American Recovery & Reinvestment Act (ARRA), Title XIII, Subpart D Overview (HITECH)
  • Business Associates New Requirements
  • Breach Notification Requirements
  • New Privacy & Security Requirements
  • Increased Enforcement & Penalties
  • Federal Reporting & Resource Requirements
  • Compliance Tips

Chapter 22 – The Omnibus Rule

  • Omnibus Rule Background
  • Breach Notification Rule
  • New Limits on Uses and Disclosures of PHI
  • Business Associates
  • Increased Patient Rights
  • Notice of Privacy Practices
  • Increased Enforcement
  • Update Action Considerations

Chapter 23 – The Meaningful Use

  • ARRA Overview
  • Meaningful Use Rule Overview
  • Vendor Certification
  • Medicare Incentives
  • EHR Technical and Meaningful Use Requirements
  • Privacy & Security Requirements
  • Proposed Meaningful Use Stage 2 Requirements

Chapter 24 –  The Red Flag Rules & Healthcare

  • Red Flag Rule Overview
  • State Identity Theft Protection Laws & ARRA Breach Notification Requirements
  • Definition of “red flags”
  • Identity Theft Protection Program Requirements
  • Implementation Tips

Chapter 25 – HIPAA Solutions Part 1

  • Risk Analysis
  • Audit Program – Annual and Periodic

Chapter 26 –  HIPAA Solutions Part 2

  • Secure Transmission of PHI
  • Policy & Procedure Development
  • Training – More Than Just an Annual Workshop
  • Disaster Recovery/Emergency Mode Operations Plan

Chapter 27 – 2018 Annual HIPAA Certification CE Credits

  • The Year in Review – Breaches and Events
  • Updates for 2018:  Special Topics
  • A Request for Information from OCR
  • Recommended Actions

The above training will prepare you for HIPAA Certification for Certified HIPAA Privacy Security Expert:


CERTIFIED HIPAA PRIVACY SECURITY EXPERT (CHPSE) Is is rated 4.8 out of 5 by  users 5361